Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Collision Avoidance Smartphone, Matt Columbres, Aaron Parisi, Joey Schnecker, Luis Wong Jun 2018

Collision Avoidance Smartphone, Matt Columbres, Aaron Parisi, Joey Schnecker, Luis Wong

Electrical Engineering

There are many instances in day-to-day life where people cannot or would rather not pay full attention to their surroundings. Walking while preoccupied with a smartphone or walking while blind are excellent examples where technology could be used to make the task of avoiding 2collisions reactive, instead of proactive. A device which monitors a user’s surroundings and notifies the user when a potential collision is detected (and, additionally, notifying them as to where the obstacle is with respect to them) could be used to make walking distracted less of a hazard for the user and those around the user and …


Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan May 2017

Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan

Computer Engineering

A series of performance-based and feature implementation software updates to an existing multiple vehicle autonomous target search system is outlined in this paper. The search system, MAQSS, is designed to address a computational power constraint found on modern autonomous aerial platforms by separating real-time and computationally expensive tasks through delegation to multiple multirotor vehicles. A Ground Control Station (GCS) is also described as part of the MAQSS system to perform the delegation and provide a low workload user interface. Ultimately, the changes to MAQSS noted in this paper helped to improve the performance of the autonomous search mission, the accuracy …


Wireless Network Intrusion Detection System, Calvin Jia Liang May 2014

Wireless Network Intrusion Detection System, Calvin Jia Liang

Computer Engineering

The Wireless Network Intrusion Detection System is a network-based intrusion detection system (IDS) that listens on a wireless network. The IDS device is a self-contained single-board-computer capable of monitoring the user’s wireless network, detecting suspicious network traffic, and reporting to the user via email. The device has two network interfaces: the wireless interface is used to monitor network traffic, and the wired interface is used to configure the system and to send out detection alerts. The system requires minimal setup, configuration, and maintenance. It is a relatively inexpensive device that tries to improve user’s situational-awareness of one’s wireless network.


Detecting Netflix Service Outages Through Analysis Of Twitter Posts, Cailin Cushing Jun 2012

Detecting Netflix Service Outages Through Analysis Of Twitter Posts, Cailin Cushing

Master's Theses

Every week there are over a billion new posts to Twitter services and many of those messages contain feedback to companies about their services. One company that has recognized this unused source of information is Netflix. That is why Netflix initiated the development of a system that will let them respond to the millions of Twitter and Netflix users that are acting as sensors and reporting all types of user visible outages. This system will enhance the feedback loop between Netflix and its customers by increasing the amount of customer feedback that is being received by Netflix and reducing the …


Irrigation Leak Detection: Using Flow Rate Sensors To Detect Breaks In An Irrigation System, Adam Openshaw, Kalvin Vu Jun 2010

Irrigation Leak Detection: Using Flow Rate Sensors To Detect Breaks In An Irrigation System, Adam Openshaw, Kalvin Vu

Computer Engineering

This report details the exploration and invention of a mechanism that can detect breaks in an irrigation system. With the ultimate goal of conserving water, we have designed an inexpensive, self sustaining flow rate monitor that can be used to identify anomalies in an irrigation system and wirelessly communicate the status of the system to a base station. Our implementation can also determine the direction of the anomaly based on the nature of the anomaly itself. This means that multiple monitors can be used to pinpoint the location of a break within the system in addition to merely detecting its …